Important Announcement: DigiCert Support Change Will Affect Check Point VPN Gateways

DigiCert has announced that starting September 8, 2025, it will stop supporting the HTTP/1.0 protocol for OCSP and CRL checks. This change impacts customers using VPN Site-to-Site or Remote Access VPN Security Gateways with certificates issued by DigiCert External CA.

 

Who is affected?
  • If your Security Gateways do not use DigiCert External CA, no action is required.

  • To check whether your VPN/Remote Access Security Gateways are using DigiCert External CA, follow the simple instructions provided by Check Point here.

 

Without upgrading protocol support, DigiCert certificate validation may fail. This could directly disrupt the functionality of Site-to-Site and Remote Access VPNs running on Check Point gateways.

 

Check Point’s solution
  • A discovery tool to identify VPN/Remote Access gateways using DigiCert External Certificates

  • A hotfix update, which upgrades communication to HTTP/1.1 once applied to the gateway, ensuring VPN service continuity

 

Detailed information about affected Security Gateways, usage of the discovery tool, and the hotfix can be found on Check Point’s official website.

More news

TrendAI™: Practical tips to get the most out of the platform

The transformation of Trend Micro into TrendAI™ brings a new perspective to cybersecurity, more automation, more AI, and a stronger focus on…

AI as the Biggest Security Threat: Key Insights from the Thales Data Threat Report 2026

Digital transformation is accelerating, but security is falling behind. Companies are rapidly adopting cloud technologies and AI, while simultaneously losing control over…

Important Changes in the RSA License Renewal Process

RSA Security is transitioning to an auto-renewal process designed to ensure smooth operations and continuous security coverage without the risk of service…